From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Problems, solutions and experience of the first international student's Olympiad in cryptography., , , , , , , , и . IACR Cryptology ePrint Archive, (2015)On the (In)security of Stream Ciphers Based on Arrays and Modular Addition., и . ASIACRYPT, том 4284 из Lecture Notes in Computer Science, стр. 69-83. Springer, (2006)Maa.. Encyclopedia of Cryptography and Security, Springer, (2005)Hash functions.. Encyclopedia of Cryptography and Security, Springer, (2005)Mash Hash Functions (Modular Arithmetic Secure Hash).. Encyclopedia of Cryptography and Security, Springer, (2005)NESSIE Project.. Encyclopedia of Cryptography and Security, Springer, (2005)Preimage Resistance.. Encyclopedia of Cryptography and Security, Springer, (2005)A Memory Efficient Version of Satoh's Algorithm., , и . EUROCRYPT, том 2045 из Lecture Notes in Computer Science, стр. 1-13. Springer, (2001)A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms., , , и . EUROCRYPT, том 2656 из Lecture Notes in Computer Science, стр. 33-50. Springer, (2003)Hash Functions Based on Block Ciphers: A Synthetic Approach., , и . CRYPTO, том 773 из Lecture Notes in Computer Science, стр. 368-378. Springer, (1993)